VMware VCM 5.3 - CONFIGURATION MANAGER SECURITY ENVIRONMENT REQUIREMENTS Instrukcja Użytkownika Strona 2

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 32
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 1
TECHNICAL WHITE PAPER / 2
Table of Contents
1.0 Introduction to The Security Environment of VCM 5
2.0 Background Concepts 6
3.0 Secure Domain Infrastructure 9
3.1 Domain controller is trusted 9
3.2 Network infrastructure is secure 9
3.3 Network infrastructure services are available 9
3.4 'Trusted' certificates, certificate authorities, and certificate servers are trusted 9
3.5 Network infrastructure hosts are at least as secure as VCM 10
4.0 Hosting Environment 11
4.1 VCM servers are secured and managed like network infrastructure 11
4.2 UI Zone machines should be subject toaccess controls 11
4.3 Data originating from a managed machine is no more trustworthy than the machine 12
4.4 Server zone machine dedicated to VCM 12
5.0 Personnel Selection and Training 13
5.1 VCM accounts are granted to users who are trusted, trained, and qualified as system and net-
work administrators 13
5.2 VCM users are advised to treat direct login prompts to VCM with skepticism and caution 13
5.3 VCMusers must protect collected data as confidential information 13
5.4 Trust individual collectionresults nomore than their source 13
5.5 Beware of cross-site scripting attacks 14
5.6 Exported data is outside the control of VCM 14
6.0 Host Preparation and Management 15
6.1 VCM hosts pass Foundation Checker checks 15
6.2 Cryptographic service providers are FIPS-140 certified 15
6.3 SQL Server best practices are followed 16
6.4 Only trusted software should be installed in the server zone 16
6.5 Perform routine backups, patches, and virus scanning 16
7.0 Safeguarding Installation Kits 17
vCenter Configuration Manager Security Environment Requirements
Przeglądanie stron 1
1 2 3 4 5 6 7 ... 31 32

Komentarze do niniejszej Instrukcji

Brak uwag